First published: Tue May 06 2025(Updated: )
SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the database. This vulnerability was found in each of the following parameters according to the vulnerability identifier ‘username’ parameter of the ‘GetLastDatePasswordChange’ endpoint.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
TCMAN GIM |
The vulnerability has been fixed by the TCMAN team in version 1280.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-40622 is considered critical due to its potential for unauthorized access and data manipulation in the database.
To fix CVE-2025-40622, update TCMAN's GIM to the latest patched version that addresses this SQL injection vulnerability.
Any user operating TCMAN's GIM version 11 is susceptible to CVE-2025-40622.
CVE-2025-40622 allows an unauthenticated attacker to perform SQL injection attacks to access, modify, or delete database information.
There is no official workaround for CVE-2025-40622, so upgrading to a secure version is the recommended approach.